Uncategorized

In this very moment, someone is clicking a link in a spam email or activating macros in a malicious document. In a few seconds, all their data will be encrypted and they’ll just have a few days to pay hundreds of dollars to get it...